by admin | Apr 4, 2013 | Computer Forensics |
Much has been publicized about the security breach of integrated webcams found in notebook computers. Some of this publicity is warranted; however, most of the risk can be mitigated by applying a few common sense practices. First, be sure the firmware for the camera... by admin | Mar 28, 2013 | Computer Forensics |
What is Personally Identifiable Information (PII) and how do we go about protecting it? PII is any information that can be used to identify, contact, or locate someone: name, gender, birth date, social security number, address (home or email), phone number(s), and... by admin | Mar 12, 2013 | Computer Forensics |
It’s all about just buying reputable anti-virus software, right? Yes and no. Having good, up-to-date anti-virus software is certainly key to helping prevent computer viruses, but it’s certainly not the only weapon of protection. The fact is that many... by admin | Feb 19, 2013 | Computer Forensics |
This popular show on The History Channel’s spinoff channel, H2, recently looked at organized crime and its evolution over the years, namely how organized crime has evolved with respect to evolutions in technology. Brad Meltzer had his team of investigators... by admin | Feb 13, 2013 | Computer Forensics |
A thief hacked into a hotel room at the Hyatt House Houston Galleria in Houston, Texas, on September 7th and stole the room occupant Janet Wolf’s laptop. Ms. Wolf, who ironically enough is an IT services consultant for Dell Computers, returned to her room to... by admin | Feb 8, 2013 | Computer Forensics |
It was recently announced that a credit union, whose identity and location were withheld, became a victim of its very own infected DVR. Thinking they had become the victim of an outside attack, the credit union had actually posted a warning to its customers on their...